IACR paper details
Search for the paper
@misc{eprint-2008-17968,
title={How to Protect Yourself without Perfect Shredding},
booktitle={IACR Eprint archive},
keywords={cryptographic protocols / mobile adversary, proactive security, adaptive security, forward security, intrusion resilience, universal hashing, partial erasures, secure multiparty computation, randomness extractors},
url={http://eprint.iacr.org/2008/291},
note={This is the full version of the paper under the same title in ICALP 2008. dylim@mit.edu 14076 received 27 Jun 2008, last revised 16 Jul 2008},
author={Ran Canetti and Dror Eiger and Shafi Goldwasser and Dah-Yoh Lim},
year=2008
}
Download a complete BibTeX file.